botherder / ntap
Transparent network tap
☆116Updated 9 years ago
Alternatives and similar repositories for ntap:
Users that are interested in ntap are comparing it to the libraries listed below
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 6 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- A powershell script for creating a Windows honeyport.☆88Updated 3 weeks ago
- Script for generating Bro intel files from pdf or html reports☆76Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆129Updated 7 years ago
- Rogue AP killer☆89Updated 7 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 7 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- Small scripts for doing repeatable tasks☆25Updated 2 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆143Updated 2 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆81Updated 9 years ago
- Script to send kippo/cowrie login attempt information to https://isc.sans.edu/ssh.html☆16Updated 8 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆86Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Malware Repository Framework☆99Updated 7 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- ☆32Updated 10 years ago
- A warehouse for your malware☆134Updated 11 years ago